-
Jun 3, 2016
Some tips to prevent and mitigate ransomware infections How prevent the infection? http://www.humor.ezgeta.com/ Do as often as possible a backup of all the important data and hold it offline and away from the local network when not in use. Avoid… read more »
-
Jun 2, 2016
A collection of scanning tools to obtain as much information as possible in a short period of time with being as stealth as possible The WarBerry was built with one goal in mind: to be used in red teaming engagement where… read more »
-
Jun 1, 2016
Android malware have adapted their attack models to target the permission-granting model that Google has introduced in Android 6.0 Marshmallow Dinesh Venkatesan, Threat Analysis Engineer at Symantec, explains in this blog post that the authors of Android Trojans have adapted… read more »
-
Jun 1, 2016
The leak is probably related to the 2014 breach On the 18th May 2016 Twitter account @w0rm has posted a link that expose 100 million Dropbox account credentials in a zipped file. https://twitter.com/wormws/status/732914034983501825 This file has been assessed as holding 4.9GB… read more »
-
May 31, 2016
Twenty-five years after the world wide web was created, it is now caught in the greatest controversy of its existence : surveillance With many concerned that governments and corporations can monitor our every move, Horizon meets the hackers and scientists whose… read more »
-
May 31, 2016
A useful windows software for Android Pentesting Aditya Agarwal is a Information Security Professional that has realized an interesting package for penetration testing and forensic purposes on android apps: Appie is a software package that has been pre-configured to function… read more »
-
May 31, 2016
A precious presentation by Pär Österberg Medina about dumping and analyzing a memory dump for detecting rootkits, discovered in the twitter feed of Binni Shah: [embed]https://twitter.com/binitamshah/status/731774589001334785[/embed] Covered topics What is a rootkit? Dumping the memory How-to analyze a memory dump?… read more »
-
May 30, 2016
Malware authors pack their software to resist reverse engineering and enable their operations to survive longer. However, many features of packing are easy to automatically identify during static or dynamic analysis. Therefore, some authors obfuscate only the most sensitive resources… read more »
-
May 29, 2016
My comments about the piece, and an example of how NOT playing it! The author Antonio Lauro (August 3, 1917 — April 18, 1986) was the son of an Italian immigrant who was an amateur singer and guitarist. His musical lessons began with… read more »
-
May 27, 2016
Let’s try to retrace the steps of this strange story July 14, 2015 From Seattlepi.com: A Vancouver middle school teacher accused of collecting child pornography online now faces federal charges. Federal prosecutors in Seattle claim Jay Michaud was caught downloading child pornography… read more »
-
May 27, 2016
Let’s changing! Unless major changes, this will be the last post of “weekly roundup”. Since I migrated the site in a Medium publication, the weekly collection of interesting links has much less sense: the publishing platform is so rapid that… read more »
-
May 26, 2016
Thanks to “Ok, panico”, who discovered this gem and has shared it with all his readers A beautiful discover, directly from the Internet Archive, free and nicely legal: the first edition (dated 1978) of “The C Programming Language”, the bible the… read more »
-
May 25, 2016
Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long running dictionary attacks among many computers. The Aircrack-ng suite provides the aircrack-ng tool, which is a 802.11… read more »
-
May 25, 2016
Don’t panic and carry a towel! Towel Day is celebrated every year on 25 May as a tribute to the author Douglas Adams by his fans. On this day, fans openly carry a towel with them, as described in Adams’ The… read more »
-
May 24, 2016
10 simple steps to install a great custom recovery on your Vodafone Smart Prime 6 Team Win Recovery Project is a Open Source project that develop a great custom recovery. A custom recovery is used for installing custom software on… read more »
-
May 24, 2016
Dedicated to the nerds grown in the 90s Recently i have read an interesting article by Fabien Sanglard about a milestone of videogames: “Another World”. I spent two weeks reading and reverse engineering further the source code of Another World(“Out Of… read more »
-
May 22, 2016
Just for fun… From WikiOfThrones: Brienne has come to Castle Black for the first time and it looks like she already has a male admirer. This admirer is not a brother of the night’s watch but the wildlingTormund. Although the thought… read more »
-
May 20, 2016
What happened relevant this week? Linkedin, Teslacrypt and other fun stuff! Security & Privacy http://xkcd.com/1683/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Geekness http://www.commitstrip.com/en/2016/05/19/the-childhood-of-a-coder-if-only-it-were-a-game/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]https://youtu.be/-ymNGu8C-as[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Programming http://www.commitstrip.com/en/2016/05/17/understanding-dev-culture/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] http://abstrusegoose.com/249 [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Music [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed]… read more »
-
May 19, 2016
LinkedIn’s 2012 data breach was more serious than previously thought http://trdealmgn4uvm42g.onion/listing/3600 An hacker, who goes by the name peace_of_mind, is trying to sell the account information, including emails and passwords, of 117 million LinkedIn users, and says that the data… read more »
-
May 19, 2016
An undeniably fun project: a camera made with a Raspberry Pi Model A+ with the Pi Camera Board and a thermal receipt printer.
https://vine.co/v/iQbiAxKnwFP
Coming it around $90 total for everything, more information on Adafruit’s Website.
… read more »